CVE-2024-50120
smb: client: Handle kstrdup failures for passwords
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
In the Linux kernel, the following vulnerability has been resolved: smb: client: Handle kstrdup failures for passwords In smb3_reconfigure(), after duplicating ctx->password and ctx->password2 with kstrdup(), we need to check for allocation failures. If ses->password allocation fails, return -ENOMEM. If ses->password2 allocation fails, free ses->password, set it to NULL, and return -ENOMEM.
| Vendor | linux |
| Product | linux |
| Ecosystems | |
| Industries | Technology |
| Published | Nov 5, 2024 |
| Last Updated | May 11, 2026 |
Stay Ahead of the Next One
Get instant alerts for linux linux
Be the first to know when new unknown vulnerabilities affecting linux linux are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Linux / Linux
7e8cffa4f85e6839335d75e6b47f918d90c1d194 < 35dbac8c328d6afe937cd45ecd41d209d0b9f8b8 c1eb537bf4560b3ad4df606c266c665624f3b502 < 35488799b0ab6e4327f82e1d9209a60805665b37 c1eb537bf4560b3ad4df606c266c665624f3b502 < 9a5dd61151399ad5a5d69aad28ab164734c1e3bc e78308a6dcab1e53b38b8dd952e69c515cd324d7 2a0fc63f1f4fccfeb367d0c57b8a243cec60c26c
Linux / Linux
6.9